General
-
Target
Balatro_1.0.1g.apk
-
Size
59.7MB
-
Sample
250209-peczaszngn
-
MD5
b27bab1cae92663538e25cf66de33e10
-
SHA1
d80a2e707bc4941fd3cce661d0d2717e0c9005c4
-
SHA256
88b3bbe33359ab337b804d0da7802fc38ba80be0030e3c514db3934d7714b8b3
-
SHA512
f0bfe0cd54e8c0db097e46f63ed1e60cb64a104a47a8734809ac3d95c5e8cfdc0c5c690801ab303d760a15575e6d7f46d36dd8b4b5443e79c1cc9657c6c59310
-
SSDEEP
1572864:L6cdRDeIp8ZWXVidi2aNxCU47PnWRH1zOAVeeSmMbscTuQ:+cdRDJp8ZWl+ECUKLAV+mYsQ
Static task
static1
Behavioral task
behavioral1
Sample
Balatro_1.0.1g.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
Balatro_1.0.1g.apk
-
Size
59.7MB
-
MD5
b27bab1cae92663538e25cf66de33e10
-
SHA1
d80a2e707bc4941fd3cce661d0d2717e0c9005c4
-
SHA256
88b3bbe33359ab337b804d0da7802fc38ba80be0030e3c514db3934d7714b8b3
-
SHA512
f0bfe0cd54e8c0db097e46f63ed1e60cb64a104a47a8734809ac3d95c5e8cfdc0c5c690801ab303d760a15575e6d7f46d36dd8b4b5443e79c1cc9657c6c59310
-
SSDEEP
1572864:L6cdRDeIp8ZWXVidi2aNxCU47PnWRH1zOAVeeSmMbscTuQ:+cdRDJp8ZWl+ECUKLAV+mYsQ
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-